ZyXEL Communications VANTAGE CNM - V3.1 User Manual page 28

Centralized network management
Table of Contents

Advertisement

Table 37 Wireless Card: 802.1x + Static WEP .................................................................................... 114
Table 38 Wireless Card: 802.1x + No WEP ........................................................................................ 114
Table 39 Wireless Card: No Access 802.1x + Static WEP .................................................................. 115
Table 40 Wireless Card: No Access 802.1x + No WEP ...................................................................... 115
Table 41 Device Operation > Device Configuration > Network > Wireless Card > MAC Filter ........... 116
Table 42 Device Operation > Device Configuration > Security > Firewall > Default Rule ................... 118
Table 43 Device Operation > Device Configuration > Security > Firewall > Rule Summary ............... 120
Table 44 Device Operation > Device Configuration > Security > Firewall > Rule Summary > Add/Edit 123
Table 45 Device Operation > Device Configuration > Security > Firewall > Anti-Probing ................... 125
Table 46 Device Operation > Device Configuration > Security > Firewall > Threshold ....................... 126
Table 47 Device Operation > Device Configuration > Security > Firewall > Service ........................... 127
Table 48 Device Operation > Device Configuration > Security > Firewall > Service > Add/Edit ......... 128
Table 49 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) ................. 130
Table 50 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Gateway Policy
Add/Edit ..................................................................................................................... 132
Table 51 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Network Policy
Add/Edit ..................................................................................................................... 138
Table 52 Device Operation > Device Configuration > Security > VPN > VPN Rules (IKE) > Network Policy
Move .......................................................................................................................... 142
Table 53 Device Operation > Device Configuration > Security > VPN > VPN Rules (Manual) ........... 143
Table 54 Device Operation > Device Configuration > Security > VPN > VPN Rules (Manual) > Add/Edit
145
Table 55 Device Operation > Device Configuration > Security > VPN > Global Setting ..................... 147
Table 56 Device Operation > Device Configuration > Security > Anti-Virus > General ....................... 149
Table 57 Device Operation > Device Configuration > Security > Anti-Spam > General ..................... 151
Table 58 Device Operation > Device Configuration > Security > Anti-Spam > External DB ............... 154
Table 59 Device Operation > Device Configuration > Security > Anti-Spam > Lists ........................... 155
Table 60 Device Operation > Device Configuration > Security > Anti-Spam > Lists > Add/Edit ......... 157
Table 61 Device Operation > Device Configuration > Security > IDP > General ................................ 159
Table 62 Device Operation > Device Configuration > Security > IDP > Signature > Attack Types ..... 161
Table 63 Device Operation > Device Configuration > Security > IDP > Signature > Intrusion Severity 162
Table 64 Device Operation > Device Configuration > Security > IDP > Signature > Actions .............. 163
Table 65 Device Operation > Device Configuration > Security > IDP > Signature .............................. 164
Table 66 Device Operation > Device Configuration > Security > IDP > Signature (Query View) ........ 165
Table 67 Device Operation > Device Configuration > Security > IDP > Anomaly ............................... 168
Table 68 Device Operation > Device Configuration > Security > Signature Update ........................... 170
Table 69 Device Operation > Device Configuration > Security > Content Filter > General ................. 172
Table 70 Device Operation > Device Configuration > Security > Content Filter > Policy .................... 175
Table 71 Device Operation > Device Configuration > Security > Content Filter > Policy > Add/General ..
176
Table 72 Device Operation > Device Configuration > Security > Content Filter > Policy > External
Database ................................................................................................................... 178
Table 73 Device Operation > Device Configuration > Security > Content Filter > Policy > Customization
185
28
Vantage CNM User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage cnm

Table of Contents